" Computer Network Security "

نویسندگان

  • Jie Wang
  • Mario Strefler
چکیده

The book gives an extensive overview of network security and the necessary cryptography. It covers standards and protocols in great detail, and can serve as a handy reference for people interested in this area. Due to the many exercises, it can also serve as one of the textbooks of an introductory course on network security. 1 What the book is about The book is intended as a textbook for a one-semester introductory course on network security, but also as a reference for IT professionals. It is divided into nine chapters, each containing also a set of exercises. The first chapter gives an overview of network security topics. After a few definitions, it presents common attacks and defense mechanisms. It gives a colorful mix of what the author considers to be the most common attacks, chosen from the whole spectrum of cryptography and computer and network security. Then the author introduces attacker types such as “script kiddies” and “cyber spies”, and rounds the chapter off with a basic security model that combines cryptosystems, firewalls, anti-virus programs, and intrusion detection systems into one picture. The second chapter is called “data encryption algorithms”, and deals with symmetric ciphers. The author gives an extensive and detailed description of the DES and AES algorithms. The treatment of block cipher modes of operation, the RC4 stream cipher, and key generation is comparatively short. At the end of the chapter, he also presents some simple attacks. The third chapter is titled “public-key cryptography and key management”, and describes mainly public-key encryption schemes and key exchange protocols. It starts with an overview of basic concepts, contains an introduction to some techniques in number theory that are fundamental for public-key crypto. The rest of the chapter describes RSA, and the ElGamal cryptosystem and Diffie-Hellman key exchange both in multiplicative groups and over elliptic curves. The chapter is rounded off with a short description of a certificate infrastructure. The fourth chapter is about data authentication. It covers the cryptographic hash functions SHA-512 and Whirlpool, checksums, the HMAC authentication, the offset codebook mode of operation for block ciphers, and the digital signature standard DSS. It closes with some more advanced material describing dual signatures and blind signatures.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Method for Intrusion Detection Using Genetic Algorithm and Neural network

Abstract— In order to provide complete security in a computer system and to prevent intrusion, intrusion detection systems (IDS) are required to detect if an attacker crosses the firewall, antivirus, and other security devices. Data and options to deal with it. In this paper, we are trying to provide a model for combining types of attacks on public data using combined methods of genetic algorit...

متن کامل

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

An Overview of Group Key Management Issues in IEEE 802.16e Networks

The computer industry has defined the IEEE 802.16 family of standards that will enable mobile devices to access a broadband network as an alternative to digital subscriber line technology. As the mobile devices join and leave a network, security measures must be taken to ensure the safety of the network against unauthorized usage by encryption and group key management. IEEE 802.16e uses Multica...

متن کامل

Network Risk Evaluation by Data Mining

Risk management is one of the most prominent concepts which has recently been brought into sharp focus regarding security issues in computer networks. Scientifically speaking, risk in the field of network security is a generalized matter leading the organization to the provision of resolutions which target resources and profits of the organization. This paper has discussed what methods are ...

متن کامل

Detecting Active Bot Networks Based on DNS Traffic Analysis

Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010